Become a Cyber Security Specialist by learning Computer Networks Security Technologies and Tools for Network Security Architects and Cyber Security Officers.
Mohamed Ibrahim
-
Rating
(5) - 1 Reviews
- 64 Students Enrolled
- 10:33 Hours
Course Overview
On completion of this course, you will reach the professional level in network security in terms of concepts, technologies, and tools. In this course, you will be able to understand all the up-to-date terminologies in the networks security.
Who this course is for:
- Network administrators
- Cyber security officers
- Network security postgraduates
- Network technical support specialists
- Security incident handlers
- IT Engineers and CEOs
- Software Developers - Security
- Web Developers - Security
- Mobile Applications Developers - Security
What you'll learn
- Introduction to FortiGate
- Fortigate Configurations
- Logging and Monitoring
- Firewall policies
- Network Address Translation
- Firewall authentication
- SSL VPN
- Basic IPsec VPN
- Explicit Proxy
- Antivirus and conserve mode
- Web filtering
- Application control
Course Curriculum
-
Introduction to FortiG... 00:23:14
-
Introduction to FortiGate 00:23:14
-
what makes FortiGate d... 00:02:01
-
what makes FortiGate different 00:02:01
-
Platform Design 00:04:54
-
Platform Design 00:04:54
-
Topology in the Cloud 00:07:14
-
Topology in the Cloud 00:07:14
-
FortiGuard Subscriptio... 00:03:29
-
FortiGuard Subscription Service 00:03:29
-
Modes of Operation 00:04:50
-
Modes of Operation 00:04:50
-
Factory Default Settin... 00:03:03
-
Factory Default Settings 00:03:03
-
Resetting a lost Admin... 00:02:11
-
Resetting a lost Admin Password 00:02:11
-
Administrator Methods ... 00:06:46
-
Administrator Methods and Profiles 00:06:46
-
Two Factor Authenticat... 00:03:27
-
Two Factor Authentication 00:03:27
-
Administrative Access 00:02:14
-
Administrative Access 00:02:14
-
Link Aggregation 00:01:25
-
Link Aggregation 00:01:25
-
Interface IPs 00:02:52
-
Interface IPs 00:02:52
-
Interface Role Compare... 00:02:20
-
Interface Role Compared to Alias 00:02:20
-
FortiGate as a DHCP an... 00:03:12
-
FortiGate as a DHCP and DNS server 00:03:12
-
DNS Database and Confi... 00:04:14
-
DNS Database and Configuration 00:04:14
-
Upgrade and Downgrade 00:01:05
-
Upgrade and Downgrade 00:01:05
-
Introduction of Loggin... 00:13:00
-
Describe Log types and... 00:08:22
-
Describe Log types and Subtypes 00:08:22
-
Describe Log Security ... 00:03:21
-
Describe Log Security levels 00:03:21
-
Describe Log Format (H... 00:03:13
-
Identify log Storage l... 00:08:23
-
Identify log Storage locations 00:08:23
-
Configure Log Settings 00:08:11
-
Configure Log Settings 00:08:11
-
Configure Remote Loggi... 00:14:01
-
Configure Remote Logging 00:14:01
-
Enable Logging on Fire... 00:06:50
-
Enable Logging on Firewall Policies 00:06:50
-
View, Filter, Download... 00:12:13
-
Monitor your Work 00:04:16
-
Monitor your Work 00:04:16
-
Configure alert email 00:01:41
-
Configure alert email 00:01:41
-
Configure, run, and vi... 00:06:47
-
Configure, run, and view reports 00:06:47
-
Firewall policies I 00:19:57
-
Firewall policies I 00:19:57
-
Firewall policies II 00:21:18
-
Firewall policies II 00:21:18
-
Firewall policies III 00:20:40
-
Firewall policies III 00:20:40
-
Firewall policies IV 00:20:40
-
Firewall policies IV 00:20:40
-
Matching traffic to Fi... 00:01:54
-
Source IP address, Dev... 00:01:54
-
Interface or Zone 00:02:00
-
Interface or Zone 00:02:00
-
Introduction to Networ... 00:05:42
-
Choose between Firewal... 00:10:50
-
Different types of IP ... 00:04:08
-
Virtual IPs configurat... 00:08:52
-
Central SNAT policy co... 00:12:08
-
DNAT and Virtual IPs 00:03:31
-
DNAT and Virtual IPs 00:03:31
-
Use a SIP session help... 00:05:57
-
Use a SIP session helper for VoIP 00:05:57
-
How to interpret sessi... 00:11:41
-
How to interpret session table 00:11:41
-
Firewall authenticatio... 00:07:33
-
Firewall authentication 00:07:33
-
Firewall authenticatio... 00:04:52
-
Firewall authentication methods 00:04:52
-
Remote authentication ... 00:02:37
-
Remote authentication servers 00:02:37
-
User configuration for... 00:20:37
-
Active and Passive aut... 00:00:42
-
Active and Passive authentication 00:00:42
-
Remote authentication ... 00:09:35
-
User authentication 00:09:03
-
User authentication 00:09:03
-
Captive portal and dis... 00:04:03
-
Introduction to SSL VP... 00:04:26
-
Introduction to SSL VPN 00:04:26
-
The difference between... 00:23:11
-
Methods of connecting ... 00:08:11
-
Configuring SSL VPN 00:26:49
-
Configuring SSL VPN 00:26:49
-
Securing SSL VPN Clien... 00:03:40
-
Securing SSL VPN Clients 00:03:40
-
Monitoring SSL VPN Use... 00:01:30
-
Monitoring SSL VPN Users 00:01:30
-
IPsec introduction 00:03:46
-
IPsec introduction 00:03:46
-
Benefits of VPN 00:01:46
-
Benefits of VPN 00:01:46
-
How IPsec VPN works 00:06:43
-
How IPsec VPN works 00:06:43
-
IEK phase 1 and phase ... 00:24:34
-
IEK phase 1 and phase 2 00:24:34
-
Policy based and Route... 00:07:17
-
VPN configuration Wiza... 00:05:02
-
VPN configuration Wizard 00:05:02
-
Monitoring VPN tunnels 00:01:43
-
Monitoring VPN tunnels 00:01:43
-
Introduction to Explic... 00:02:10
-
Introduction to Explicit proxy 00:02:10
-
What is an explict web... 00:10:21
-
What is an explict web proxy 00:10:21
-
PAC file vs. web proxy... 00:04:39
-
Web cache 00:02:06
-
Web cache 00:02:06
-
IP based vs Session ba... 00:01:34
-
Explicit web proxy con... 00:08:49
-
Explicit web proxy configuration 00:08:49
-
Explicit proxy address... 00:07:19
-
Explicit proxy addresses 00:07:19
-
Monitoring Explicit pr... 00:01:32
-
Monitoring Explicit proxy users 00:01:32
-
Introduction Antivirus... 00:04:50
-
Types of Malware 00:04:03
-
Types of Malware 00:04:03
-
Heuristic, grayware an... 00:05:12
-
Types of antivirus dat... 00:02:02
-
Types of antivirus databases 00:02:02
-
Sandboxing 00:01:54
-
Sandboxing 00:01:54
-
Proxybased vs Flowbase... 00:07:48
-
Proxybased vs Flowbased scans 00:07:48
-
Scan encrypted traffic... 00:07:08
-
Memory conserve mode 00:01:56
-
Memory conserve mode 00:01:56
-
Web Filtering 00:11:38
-
Web Filtering 00:11:38
-
Control and Monitor ap... 00:09:49
-
Update the application... 00:15:44
-
Configure traffic shap... 00:14:09
-
Cloud Access Security ... 00:09:04
-
Monitor application fr... 00:02:30
-
Monitor application from FortiView 00:02:30
Item Reviews - 1
Submit Reviews
This Course Include:
- 10:33 Hours On-Demand Videos
- 87 Lessons
- Lifetime Access
- Access on Mobile and TV
- Certificate of Completion
Mohmed Faiyaz 25 Jun, 2020
" Great Course..! Experienced the Expert-Level Training on Next-Generation Firewall - FortiGate. "